Managing Security of Virtual Machine Images in a Cloud Environment



Similar documents
Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point

Top virtualization security risks and how to prevent them

DACSA: A Decoupled Architecture for Cloud Security Analysis

Web Application Firewall

Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point

Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

F-Secure Internet Gatekeeper Virtual Appliance

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Cloud Models and Platforms

<Insert Picture Here> Enabling Cloud Deployments with Oracle Virtualization

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

IBM Security Intrusion Prevention Solutions

How To Create Private Cloud Pdf On Your Computer Or Your Phone Or Tablet Or Ipad Or Ipa Or Ipo Or Ipod Or Iporode Or Iproode Or Your Computer (Or Your Phone) Or Your Iporod Or Your

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

Shavlik NetChk Protect 7.1

Securing Virtual Applications and Servers

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting

Netzwerkvirtualisierung? Aber mit Sicherheit!

IBM Endpoint Manager for Core Protection

McAfee Public Cloud Server Security Suite

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Comprehensive security platform for physical, virtual, and cloud servers

Towards an understanding of oversubscription in cloud

VMware vcenter Update Manager Administration Guide

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Total Cloud Protection

Beyond passwords: Protect the mobile enterprise with smarter security solutions

GFI White Paper PCI-DSS compliance and GFI Software products

A Survey on Data Integrity of Cloud Storage in Cloud Computing

Elastic Detector on Amazon Web Services (AWS) User Guide v5

Safeguarding the cloud with IBM Dynamic Cloud Security

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Firewalls and Software Updates

PICO Compliance Audit - A Quick Guide to Virtualization

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

How To Build A Software Defined Data Center

Cloud Computing and Amazon Web Services

BDR TM for VMware. VMware BACKUP WITH VEMBU. VEMBU TECHNOLOGIES TRUSTED BY OVER 25,000 BUSINESSES

Spyware Analysis. Security Event - April 28, 2004 Page 1

Understanding ArcGIS Deployments in Public and Private Cloud. Marwa Mabrouk

Devising a Server Protection Strategy with Trend Micro

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

FileCloud Security FAQ

The Cost Effective Migration to Integrated Hybrid SaaS Security

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

Security Issues In Cloud Computing and Countermeasures

Symantec AntiVirus Enterprise Edition

2) Xen Hypervisor 3) UEC

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage

RCL: Software Prototype

STREAM FRBC

Introducing ZENworks 11 SP4

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

Efficient Cloud Management for Parallel Data Processing In Private Cloud

What Do You Mean My Cloud Data Isn t Secure?

Vulnerability Management

Increasing virtual machine security in cloud environments

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Experiences with Eucalyptus: Deploying an Open Source Cloud

Cloud and Data Center Security

Data Security: Fight Insider Threats & Protect Your Sensitive Data

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange

Stay ahead of insiderthreats with predictive,intelligent security

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

Computer Viruses: How to Avoid Infection

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

Making Data Security The Foundation Of Your Virtualization Infrastructure

How To Protect Your Cloud From Attack

Data Centers and Cloud Computing

How RSA has helped EMC to secure its Virtual Infrastructure

Addressing Security for Hybrid Cloud

Transcription:

IBM Research, Hawthorne NY Managing Security of Virtual Machine Images in a Cloud Environment Jinpeng Wei Florida International University Xiaolan Zhang, Glenn Ammons, Vasanth Bala IBM T J Watson Research Center Peng Ning North Carolina State University

Virtual Machine Images in a Typical Cloud Virtual Machine (VM) = logical computer VM Virtual Machine Image (VM Image) = logical computer in a VM image repositories: collections of VM images E.g., VMware virtual appliance market place, Amazon machine images (AMIs) collection in EC2 Facilitate deployment of new virtual machines Reduce management/configuration cost of the cloud users VM image sharing is one of the underpinnings of cloud computing

Security Risks in an Image Repository The publisher s risk: inadvertent leaking of sensitive information (private data or intellectual properties) and unauthorized access to the image Sensitive information is often stored without the publisher s awareness. E.g., autocomplete feature of some browsers The retriever s risk: running vulnerable or malicious virtual machine images A retrieved image may be instantiated into a full-fledged intruder machine inside a corporate network. Easier way to deploy Trojan Horses The repository admin s risk: hosting and distributing images that contain malicious or illegal content Software patches, software license compliance checks No systematic way to track image ownership, provenance or derivation relationships

Solution Overview: Mirage An access control framework: regulates the sharing of VM images Image filters: remove unwanted information in the image A provenance tracking mechanism: tracks the derivation history of an image and the associated operations performed on the image A set of repository maintenance services, such as periodic virus scanning of the entire repository, that detect and fix vulnerabilities discovered after images are published

Implementation: the Mirage Image Library Conventional image library Mirage image library C A disk disk B disk Disk granularity store Disk based representation No image relationships Hypervisor-dependent Merely a storage system for image disks image manifest derivation history C A B content references Content addressable, granularity store File based representation Image relationships (think CVS) Hypervisor-agnostic A sophisticated store with APIs to directly manipulate images without deploying them as instances or fully assembling their disks Conventional disk is reconstituted when an image is checked out

Preliminary Experiments Total scanning time (s) 18000 16000 14000 12000 10000 8000 6000 4000 2000 0 ClamAV scanning time 1 2 3 4 5 6 7 8 9 The VM images are daily snapshots of a large, commercial, Eclipse-based development environment (6GB, ~60,000 s) Each unique is scanned only once, even if shared among many VM images Scanning time gains depend on the similarity among VM images Number of images traditional Uses a reverse index (constant time operation to identify image manifests containing reference to F) Mirage Scan the CAS as if it is a single system; For each infected F { For all image manifests that contain a reference to F, flag the reference as infected ; }

Acknowledgements IBM T. J. Watson Research Center Bowen Alpern Arun Iyengar Todd Mummert Darrell Reimer Jian Yin

Thank you!